It was a decade ago when people used to get astonished and baffled if they come across the ‘waterproof electronic device’ word. In today’s world, we have got water proof mobiles, self healing screen-guards, anti-corrosion iron rods and what not! These wonders are undoubtedly achieved through the hydrophobic coatings.

With the increasing awareness of this superhydrophobic coating which is nothing but the nanoscopic layer that repels water; it has increased its potential use in almost all the daily use products. This same element that keep your devices water resistant & smudge free could one day also be used to entertain us while we laze about on the couch. Today I will take you through one of the jaw dropping possibility and potential usage of superhydrophobic coating.

Displays might just be made of Air & Water!

Nope, I am not DRUNK! Days are not far when we will be introduced to the LED/LCD less displays which are made up of just air and water. Researchers at Aalto University in Finland have successfully evolved a unique display technology that consists of just air and water, instead of LCDs or LEDs. This is made possible through the superhydrophobic surfaces which are water resistant coating.

Impressive, huh! Or rather mind jolting isn’t it? I suppose your eyes are still wide open and your facial expression shows curiosity! If not, then check out the video below that shows the implementation of this technology.

Still wondering what is the science behind that? Or how exactly superhydrophobic coating is responsible for that? The secret behind this technology is multi-level hydrophobic surface that repels water and traps air. Has that already started to make sense now? The researchers immersed a dual-structured, superhydrophobic surface covered with the tiny posts under water. These posts are just ten micrometers in size that are each covered with even smaller nanofilaments. Using an accurate nozzle that doubles as a printing head, the fellow researchers are able to switch the surface between wet and dry, even though the surface is totally submerged underwater the entire time. Because of this property, they’re able to write, draw complex designs and images like an inkjet printer does.

By now you must have got the idea of what Nokia could come up with in the future. After the Oleophobic coating based fingerprint feature, one can also expect a Smartphone that will bear the above property. Of course it has got a long journey to undergo until it actually spread its roots in our daily life, but eventually, might be, all our digital display devices might attain the ultimate act of enlightenment and can be made of nothing but air and water.


So I am back after a lot of time and I was not sure on what I should be writing so I thought I would just go with what impresses me. I will be covering everything from new inventions, software, food, current affairs and pretty much anything.

So basically the first entry on this blog is going to be something that is freaking awesome and also one with great utility. I don’t know if many people have heard of this but I recently read up a lot on hydrophobicity . No not rabies. I am talking about the ability of water to actively repel water. I found out from this post here. Basically you can get any kind of surface and coat it to prevent water from ever accumulating over it. You can see the video below for an idea of how it works

So as you can see the water basically just rolls off. It does not look like it is completely water proof but it is pretty neat that there can be no staining on the surface ever and I read up that droplets of water can actually pickup dust particles from the surface keeping it cleans. So it’s pretty neat basically. I read on this post on a website here that you can get all sorts of hydrophobic coatings from different providers.

Most of them seem good, although I was pretty impressed with the Aculon felt tip hydrophobic coating applicator pen that simply allows you to make certain areas of a surface hydrophobic. I mean it will be great to see some great art ideas with them.

So what do you guys think of this first post? Was my first entry impressive enough? Let me know in the comments below. Also please let me know if you have some things on your list that I should check out.

eCommerce Solutions

eCommerce Solutions

Every year we see new trends in almost everything to cover up the needs of modern time and modern age. There are certain things that have been added in the previous list to make things better.

Online buyers can have an area day enjoying their home shopping spree online through the myriad of web enterprise stores that incorporate ecommerce characteristics to facilitate online buys or orders of goods and services. This approach advantages all parties which sketches more businesses to request the best ecommerce solution in the market to stay ahead of the affray and draw more vigilance on their own brand and goods or services.

This new buyer group is affluent in the latest technologies to demand a very simple buying formaton these online stores that facilitate very simple browsing and buying of any merchandise, service or information located.

These online consumers can have a field day enjoying their home buying spree online through the myriad of online enterprise stores that incorporate ecommerce characteristics to facilitate online buys or orders of goods and services. This approach advantages all parties which draws more businesses to request the best ecommerce solutions in the market to stay ahead of the affray and draw more vigilance on their own brand and goods or services.

Knowing these amazing benefits have made us think that who will build a better e-commerce solution for the company and who will manage it. Web Development Company Dubaiis offering these services to various business types. These business ecommerce solutions will help the company to grow their businesses online.

There are different features that must be present in an e-commerce solution and few of them have been listed here.

Everybody wants cost effective and effective ecommerce solutions that would develop truly incredible made-to-order online retail stores on the Internet for the convenience of online buyers. These new and trendy online shops incorporate the best ecommerce tools and architecture on their website to facilitate a magnificent online buying know-how.

Enterprise companies can address an very simple to handle online buying cart and multiple payment entrances through the alternative stages of Magento, Drupal,Joomla,OsCommerce,WordPress,  X-Cart, AspDotNetStorefront and Zen Cart or Big business.

Skilled and reliable ecommerce website developer’s designers and developers work assuredly in manipulating the appropriate source cipher and templates to match the online buying needs and obligations of the enterprise as well as the web buyer.

Safe and protected payment schemes with taut security protocols are applied to double-check a smooth transaction of significant data across the Internet to bypass online frauds, personal identity thefts and spam. The best ecommerce solutions for any enterprise would be one that conceptualizes the enterprise objectives and procedures effectively to be outcome oriented.

Just remember that the simple step does not work in the growing market scenario there are things that must get complicated to deal with the growing complexity of market. every user want something unique and that is why they usually opt for a service that is user friendly but fix their issues within seconds.

Author Bio:

I am Alan David working with SpiralclickeCommerce Solutions, a dubai based web design company offering services Corporate Identity Design, Interface Design, Software Development, Business intelligence, web design solutions, Mobile applications development, logo design.

— Customers buying and surfing internet on Airtel 3G dongles can now use F-Secure powered security software , Airtel PC Secure to protect their computers from viruses, malware etc with a Free 30-day trial offer.

— Following the 30-day trial period, customers may subscribe to an Airtel PC Secure pack to suit their online security needs

F Secure, a leading provider of Internet Security and Backup solutions for Home and Corporate customers, today announced that customers buying Airtel 3G dongles will now get 30 days of free access to its computer Antivirus solution, Airtel PC Secure.

This will help Airtel 3G dongle users leverage a world class data experience on their PCs while using Airtel PC Secure to ensure maximum security from viruses and other online threats.

Following the 30-days trial period, customers will be able to choose from a range of packs (see table given below) and opt for a subscription model to Airtel PC Secure to suit their needs.

To get airtel pc secure for your Airtel 3G Dongle, logon to .

Airtel PC Secure packs for Airtel 3G dongle customers 

Powered by F-Secure, PC Secure on Airtel is a robust and reliable software designed to protect the computer from all kinds of malicious software (including spyware, worms, trojans, rootkits and zero-hour attacks) and ensure 100% safety of customers’ personal information (such as bank details, passwords etc.) in the online domain.

Mr.Venu Palakirti, Country Manager, India & SAARC at F-Secure says: “We are very pleased to extend our security services from wire line customers to 3G Dongle customers on Airtel. The service will ensure fully protected PC experience for internet users. With this, we reinforce our leadership as a provider of security and content-related services through operator partners around the world.”

A recent F Secure survey concluded that more than 90% of households are estimated to have PCs infected with spyware/adware, 87% of which lack access to current antivirus software. It was also found that 700 new viruses are added to the count of a whopping 500000 viruses that exist to date.

F-Secure today delivers a full portfolio of security and content-related services to more than 200 operator partners in more than 40 countries worldwide. This growing network spans over 250 million mobile and broadband users and includes major carriers in the major markets from India and Brazil through to Germany and the U.S.

About F Secure Corporation

While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.

Reference :


BEIJING—A battle is emerging between Baidu Inc. BIDU -0.96% and upstart Qihoo 360 Technology Inc., QIHU -2.41% underlining the high stakes in China’s growing Web-search market.

Qihoo’s emergence as a real player in search just a few weeks after unveiling its search engine has rattled Baidu—long the country’s dominant search provider. Google Inc.’sGOOG -0.92% market share has fallen steadily here since the U.S.-based Internet giant moved its services to Hong Kong two years ago.

China is home to more than 500 million Internet users, and second-quarter search advertising revenue reached more than $1 billion, according to research group Analysys International. So Baidu acted swiftly to protect its turf.

Qihoo, which has built a strong user base on the popularity of its Internet security software and secure browser, in early August started a search engine to compete with Baidu. But search results on Qihoo (pronounced chee hoo), listed links from Baidu results and services, such as maps, music and photo search.

Baidu responded by making it difficult to click through to Baidu services from Qihoo’s site, providing links to older, cached results—rather than fresh results—or directly to a Baidu page.

Investors reacted strongly. Baidu’s American depositary receipts have dropped 15% on the Nasdaq Stock Market over the past two weeks, while Qihoo’s ADRs have climbed 18% on the New York Stock Exchange.

“We’re not worried, we are doing the right thing,” Qihoo Chief Financial Officer Alex Xu said. “Basically, the search market before we launched was underserved by Baidu.”

Baidu declined to comment.

Though other Chinese Internet companies have tried in vain to cut into Baidu’s nearly 80% of search-market revenue, analysts project that Qihoo could take 10% of the market in coming quarters. Google is China’s No. 2 search engine, with 15% of the market.

J.P. Morgan analyst Dick Wei said Qihoo is likely to take market share from both Baidu and Google as inexperienced users of Qihoo’s portal use its own default search engine. According to Baidu statistics, Qihoo’s browser supplies 21% of Baidu’s traffic, meaning Qihoo could take even more market share from Baidu.

Google didn’t respond to a request for comment.

Although little known outside of China, Qihoo has capitalized on the volume of viruses and malware on China’s Internet to attract users to the company’s secure browser and portal. According to Qihoo, its browser had 270 million monthly users in the first quarter, while its website had 77 million unique daily hits.

The company was founded in 2006 by Zhou Hongyi and Qi Xiangdong, Qihoo’s current chief executive and president, respectively. Mr. Zhou is the former head of Yahoo Inc.YHOO -1.15% in China and one of the most outspoken of China’s tech tycoons, frequently at odds with other leaders of China’s biggest Internet companies.

With the introduction of its search engine, Qihoo aims to funnel much of its large user base into its own search, giving the company a piece of China’s highly profitable search advertising.

Qihoo has battled other Chinese Internet companies before. In 2010 the company accused online-games maker Tencent Holdings Ltd. TCEHY -2.38% of scanning the private data of Tencent’s users. Tencent retaliated by cutting off its QQ instant-messaging service for users of Qihoo antivirus software. The spat earned each company a rebuke from China’s Ministry of Industry and Information Technology.

Analysts warned that it will be no easy task for Qihoo to break into Baidu’s core market as Baidu has more cash and significantly larger engineering resources at its disposal.

Mr. Wei, of J.P. Morgan, wrote that the most valuable high-end users eventually would be wooed back to Baidu’s search engine by its array of products, such as maps and streaming music search.


Congressional efforts to introduce cybersecurity legislation have failed this summer, at least for the time being, but the private sector has hardly been idle in creating defenses against hackers and viral threats.

Some details of this security activity must necessarily be kept secret, because cyber-war defenders cannot afford to tip their hand to hackers. Online security is analogous to a military intelligence operation at every level, from vendors providing anti-viral solutions for home users, to massive corporate security structures.

This makes it difficult to put together a broad picture of private security efforts, but Larry Clinton, president of the Internet Security Alliance, estimated before a House Energy and Commerce subcommittee in February that private sector security spending totaled an astonishing $80 billion in 2011.

This expense covers a constantly evolving defensive architecture, which must cope with eternally mutating viral threats and innovative hacking techniques. Most personal users can get a faint impression of how quickly this game of cat-and-mouse plays out by noting how frequently their personal anti-virus software is updated.

Multiply that sense of urgency by a billion, and you have an idea of the challenge faced by top-level Internet security experts.

Nothing to sneeze at

Those little personal-computer antivirus programs are nothing to sneeze at. A huge amount of work goes into designing and updating them. Top security software companies, such as Symantec and McAfee, publish enormous databases of viral threats, which they update daily. McAfee offers visitors to its website a global virus map, and a viral threat level indicator similar to the one used by the Department of Homeland Security for terrorist threats. Symantec has a global risk timeline, which graphically tracks the detection and defeat of viral threats from day to day.

Market research firm Canalys projects that 2012 will see a nearly 9 percent increase in sales of security software, bringing the global value of that market to $22.9 billion. Heated competition from many different vendors for a share of that immense market has kept the cost of security software for home users remarkably low. In fact, programs from some vendors can be downloaded for free, while even the more powerful and highly regarded packages for home users cost about the same as a video game.

And yet, some observers believe that even this enormous private-sector investment in security is not sufficient. A study prepared by Bloomberg News, in cooperation with a research firm called the Ponemon Institute, concluded that a core group of industries and government agencies would need to boost security spending by nearly 800 percent to achieve 95 percent protection against electronic attack.

Financial companies were said to require a 1,300 percent increase in spending to achieve such a level of safety. The Ponemon Institute estimated that the current average level of safety from online attack is only about 69 percent.

Interestingly, respondents to this study had to be promised anonymity to participate, because it is so risky to discuss the details of cybersecurity programs.

Storm-tossed electronic ocean

This, of course, led to calls for government to compel the necessary increases in security spending, through some combinations of incentives and mandates. Part of the problem is that computer systems have become tightly connected through the Internet. A high-security system exposes itself to danger by allowing connections from a lower-security system. This leads high-security system operators to desire minimum standards of integrity for every system they interact with.

That was much easier to arrange when “online” connections involved modems dialing into carefully protected phone numbers. Now that online interconnectivity is a real-time, always-on sea of high-speed communications, security threats are greatly magnified. Nearly every computer device has a theoretical connection to every other device.

Yesterday’s critical systems were fortresses with occasional leaks in their data plumbing; now they’re tiny boats forever adrift in a storm-tossed electronic ocean. And we have yet to witness the Internet equivalent of a hurricane sweeping across that sea of data: an orchestrated cyber-attack launched by a hostile foreign power.

One of the greatest concerns facing private-sector security operations is the question of legal liability. Legislators want private teams to coordinate with each other, and the government, to detect and defeat large-scale online threats. Private corporations worry this could get them sued by angry users for violating their privacy.

The value of the data at risk from electronic sabotage is difficult to determine, and no corporate manager relishes the thought of conducting that evaluation before a jury, with millions of dollars in damages on the line. It’s difficult to determine what a reasonable investment in defense measures should be, when the value of the digital property at risk cannot be readily calculated.

Another serious problem facing private security teams is the danger of making their defenses so tough that legitimate users find it difficult to access their systems, compromising the value of the products and services they offer. There’s an old saying in the computer world that 100 percent security can be achieved only by unplugging your computer. No profitable electronic enterprise wants to risk “unplugging” itself from the Internet, by implementing security procedures its customers find excessively inconvenient.

Even the strongest proponents of cybersecurity legislation acknowledge that the private sector will take a leadership role in protecting America’s online infrastructure. The challenge is to achieve the right level of  information sharing and data security without imposing ruinous costs on private enterprises, or compromising the flexibility of the fast-moving online security industry by submerging it beneath a bureaucratic quagmire.

Business managers are keenly interested in defending their operations from serious threats, but less enthusiastic about spending massive sums to buy protection from hypothetical menaces. On the Internet, hypothesis can become practical reality with astonishing speed.

By: John Hayward

There is no way out to protect the laptop from virus. You might be checking your mails and due to that also virus can enter your laptop. But the best way to be safe is to install the antivirus software.

Antivirus software method protects your laptop from worms, Trojan and lots of different sorts of threats. Without an antivirus application your laptop is liable to these sorts of attacks. Setup the Window packets to automatically updating if anything new is found or the screen pops up whenever the laptop is turned on or while you are installing or downloading anything new then it warns you if it is harmful to download. For online antivirus software you can avail Computer SW promotional codes.

Follow these simple steps to be safe and secure your data from virus.

1. Decide if you wish to pay some extra cash and procure your antivirus software system or use a free antivirus application.

2. If you opt to procure your antivirus software system you will be able to pip out directly from the antivirus company or head bent your native store with an electronic section and pip out there.

3. If you opt to transfer a free antivirus application you will be able to transfer it directly from the antivirus company’s web site. If you have got dial-up web it’s going to take hours to transfer.

4. Run the installer for your antivirus application. Follow all the steps specifically because the installer says too. Regarding all antivirus installers setup the antivirus application for optimum protection.

5. Run the installer for your antivirus application.

6. Once it is installed it’s a decent plan to visualize for updates if the installer did not get it on throughout the installation.

7. Once everything is setup and updated it’s conjointly a decent plan to run a scan and take away any virus which will be present in your laptop before the antivirus application was runned.

8. Analyzed your antivirus application before you install it.

9. Install only one application at a time because if there are more applications then their results will also vary. So put the best antivirus software that is most excellent.

10. Backup your laptop before installing in simply to be safe if something goes wrong.

Author Bio

Sophiya Aden is a contributor and writer for She writes about the antivirus software which can be helpful for protecting your laptops and computers. By purchasing online you can save your budget.

Securing the network is only the first step in an organization’s security policy. Once done, creating a safe baseline is the next essential step. A network scanner, however, can help automate this task, allowing your IT administrators to concentrate on other tasks.

So how can a network scanner help you maintain a secure network?

What is important is that you continuously monitoring your network. Just because you have no vulnerabilities today, it does not follow that you will have no vulnerabilities tomorrow – even if nothing on your network changes in between. Every day, new vulnerabilities are found in software, hardware and configurations previously thought to be perfectly safe.

So what should we be looking for with our network scanner in order to keep our network secure?

Missing Patches:

As a start we need to make sure that all of our software, whether it’s our operating system or a third party application, is fully updated with the latest security patches that are issued by its respective vendors. Un-patched software is a weakness in our network’s armor that can be exploited by attackers from within or outside the organization.

New vulnerabilities:

Not all discovered vulnerabilities are patched immediately. This is especially true of 0-day vulnerabilities, as these would not yet have been analyzed by the vendor, had a fix designed, developed, and distributed. This process can take weeks, even months.. During that period, malware developers will use this vulnerability as an attack vector, continuing to do so for at least a few months after a fix is made available. Knowing such vulnerabilities exist will help your system administrator to take remedial action where possible. This will ensure that the vulnerability will not be easily exploitable by attackers; even if that means banning the use of such software until a fix is available.

Changes to The network:

You also need to monitor on a continuous basis every change that is made to the network or its configuration – even if it’s just adding a printer. You should also be monitoring your computers, looking at changes like the installation of new software, the creation of new users, or even new open shares. Changes can cause numerous problems, making it harder to properly test patches prior to their deployment. Also, the change itself can increase the vulnerability of your network. Even a network printer can become a liability if attackers manage to connect to it using default credentials, thereby obtaining access to the last X number of documents that were printed from that printer.

The level of network security will greatly improve if you use a network scanner to monitor these areas discussed above. Automating the process not only makes it easier but gives network administrators more time for other equally important tasks. IF the network scanner detects any changes, the network administrators can investigate to see if the situation warrants any action. A robust network scanner is an essential tool to use if you are keen on securing your network on a daily basis.

This guest post was provided by Emmanuel Carabott on behalf of GFI Software Ltd. GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. Discover what other benefits a network security scanner can offer your organization.

All product and company names herein may be trademarks of their respective owners.

With a little help from wi-fi

Posted: August 13, 2012 in Internet

As our lives become increasingly connected, we are becoming more dependent on the internet than ever. Even when just out for a coffee, some people can’t resist checking emails, the sharemarket, or what their friends are up to on Facebook.

But an ”always-on” lifestyle comes with a price tag if you rely on your phone’s or wireless dongle data connection all the time. This is where free wi-fi hot spots come in handy. Wi-fi hot spots are becoming ubiquitous. In fact, some people are able to move around the city purely connected to free wi-fi, without paying any mobile data charges.

Often the effort [to connect] isn’t really worth it.

Beau Giles, IT student

Fast-food outlets such as McDonald’s and Hungry Jack’s have offered free wi-fi to customers for some time now, and cafes and bars soon followed. Last year, Sydney Ferries introduced free wi-fi on its vessels, while access points are now commonplace at most airports around the world. When Sydney’s Museum of Contemporary Art (MCA) finished its renovations this year, it introduced free wi-fi for visitors. On average, more than 300 people a day connect to the MCA’s wi-fi for personal browsing and to engage with gallery experiences.

There is a range of websites, blogs, forums and apps that keep track of free public wi-fi hot spots in your city or town, such as Their associated iPhone app uses GPS to find nearby eateries with free or cheap wi-fi, and gives directions to them.


Some might think that finding a hot spot, reading through terms and conditions and clicking ”accept” is a lot of effort just to save a few bucks in data charges, but if you are travelling overseas, for instance, you could save hundreds in data roaming fees.

Sam Henry, a 22-year-old business graduate from the University of Colorado, did just that while interning in Sydney.

”Since I didn’t have an Australian data plan, I relied on hot spots for all my internet needs,” he says. Henry used his iPhone to read emails, browse Facebook and make calls. With apps such as Skype and Viber, it is possible to place free calls over the internet on wi-fi and avoid not only data but all charges from telephone and internet service providers. With Apple’s inbuilt iMessage app, and others such asWhatsApp, text, picture and video messages can all be sent over the internet, too.

But while public wi-fi is convenient, it can be slow and cumbersome.

IT student Beau Giles connects to public wi-fi on his MacBook laptop and iPhone to check emails, but the 18-year-old says the connections are often too slow for more intensive use, such as browsing YouTube and listening to music on Spotify. ”It’s fiddly having to connect, agreeing to terms and conditions, just to check an email,” he says. ”Often the effort isn’t really worth it.”


Is free wi-fi secure? ”There are some risks associated with public access points,” says the head of technology for Asia-Pacific at security software company Sophos, Paul Ducklin. A security adviser at AVG AU/NZ, Michael McKinnon, says: ”The best assumption is you’re not secure.”

But both specialists say you can still use public internet if you keep a few things in mind. Here are some simple rules to follow to connect safely.

1. No password, no go. Security depends largely on whether the network is open or secure. Basically, does it have a password or not? ”When you are using an access point, you need to be using a secure connection for everything,” Ducklin says. ”If it’s not an encrypted access point, then anybody can see what you’re doing.” If the network doesn’t have a password, find one that does.

2. No sensitive content. ”I certainly wouldn’t be using any sites that required a credit card,” McKinnon says. Even if a public network has a password, it is best to save internet banking or credit card payments for private home or office networks.

3. Browse securely. Wherever possible, use sites that are secured with SSL encryption. This can be achieved by typing ”https” before the website address, rather than just ”http”. Be sure to physically type this into the browser, not click on a link that claims to be secure, as these can often be false.

4. VPN. If you are on the go but need a constant, secure connection, a mobile virtual private network, or VPN, is a good option. The software will encrypt your traffic but maintain your login session as you move across different access points.

5. If all else fails, use 3G. If you do need to conduct sensitive browsing, such as internet banking, while out and about, your safest option is to either find a private network or revert to 3G mobile internet. ”A 3G connection is inherently encrypted by default,” McKinnon says. ”[It] does tend to be a little more secure than an open wireless network.”

Beyond this, the general rules of internet security apply. Make sure your software is up to date and use an antivirus program (yes, even Macs can get viruses).

”Nothing’s perfect,” Ducklin says. ”It’s like going to a street market rather than a well-run shopping centre – you can get some great bargains, but sometimes you’re on your own.”

With this in mind, you might just be able to save yourself a few bob.

Source By James Manning “Reporter”

Corero Network Security plans to make inroads into the Thai market next year to capitalise on increased information security spending.

The US-based online security firm wants to tap the local telecommunications sector, government agencies and educational institutions.

“We’re looking to set up a local office here in 2013,” said Eryin Halmen, Corero’s newly appointed manager for Southeast Asia.

Mr Halmen calls Thailand a key strategic country in Southeast Asia and one of its highest information-technology (IT) spenders.

“Having a local operating unit will help us serve more local needs,” he said.

Corero pioneered products to counter distributed denial of service (DDoS) attacks.

DDoS occurs when a multitude of compromised systems attack a single target, thereby causing denial of service to users of the targeted system.

The firm is introducing its First Line product to stop DDoS attacks, protect IT infrastructure and eliminate system downtime.

Mr Halmen said the number of application-layer attacks is on the rise.

Unlike conventional network-layer DDoS attacks, application attacks fall below the bandwidth-consumption radar and are harder to identify and stop.

Research by Infonetics shows the market for DDoS protection is growing rapidly and will be valued at US$450 million by 2015.

Forrester Research has named DDoS protection a top-five security technology opportunity in the next three years.

In the past, firewall and intrusion prevention systems were the anchor of protection for large organisations.

But these technologies were not purpose-built to withstand the new attacks and are falling short, leaving firms vulnerable.

Mr Halmen said Corero has appointed two main distributors _ Information Security Consultant and BlueZebra.

Source : Business > Economics